ScreenShot
Created | 2021.09.28 16:10 | Machine | s1_win7_x6401 |
Filename | gobro.exe | ||
Type | PE32 executable (GUI) Intel 80386, for MS Windows | ||
AI Score |
|
Behavior Score |
|
ZERO API | file : malware | ||
VT API (file) | 21 detected (AIDetect, malware1, malicious, high confidence, Unsafe, Attribute, HighConfidence, Raccoon, Racealer, FileRepMalware, Generic ML PUA, Sabsik, Artemis, Generic@ML, RDML, dO0bZ8YYOTqxJDER3vU9VA, Static AI, Malicious PE, ZexaF, @J0@aOZXRanO) | ||
md5 | 73fd366a5572fca7a981ed7a3f0b6150 | ||
sha256 | 43400e3c2f7a18186805d95fab6fdd0625f6d63f4e5229c358df79c8475312d2 | ||
ssdeep | 98304:ZZR+mIv9K3wvbpM37cJ5Mm+EEpJ0zgC8L8Bj35/TSN:n2vdMLckmgpJgx3plS | ||
imphash | 5b9290431b366a1252cf05522cb28180 | ||
impfuzzy | 12:vYK5KjHN3c2A+O6LOTlYKrKCKA4Q5kBZGoQtXJxZGb9AJcDfA5kLfP9m:vYK5K7K2ZOuCSKGXQ58QtXJHc9NDI5Q8 |
Network IP location
Signature (5cnts)
Level | Description |
---|---|
warning | File has been identified by 21 AntiVirus engines on VirusTotal as malicious |
notice | Allocates read-write-execute memory (usually to unpack itself) |
notice | The binary likely contains encrypted or compressed data indicative of a packer |
info | The executable contains unknown PE section names indicative of a packer (could be a false positive) |
info | The file contains an unknown PE resource name possibly indicative of a packer |
Rules (3cnts)
Level | Name | Description | Collection |
---|---|---|---|
watch | Malicious_Library_Zero | Malicious_Library | binaries (upload) |
info | IsPE32 | (no description) | binaries (upload) |
info | PE_Header_Zero | PE File Signature | binaries (upload) |
PE API
IAT(Import Address Table) Library
KERNEL32.dll
0xb23000 GetVersionExW
USER32.dll
0xb23008 wsprintfW
GDI32.dll
0xb23010 BitBlt
ADVAPI32.dll
0xb23018 GetTokenInformation
SHELL32.dll
0xb23020 SHGetFolderPathA
ole32.dll
0xb23028 CoInitialize
USERENV.dll
0xb23030 GetUserProfileDirectoryA
ktmw32.dll
0xb23038 CreateTransaction
crypt.dll
0xb23040 BCryptDecrypt
CRYPT32.dll
0xb23048 CryptStringToBinaryA
SHLWAPI.dll
0xb23050 StrCmpNW
WINHTTP.dll
0xb23058 WinHttpSendRequest
gdiplus.dll
0xb23060 GdiplusStartup
WTSAPI32.dll
0xb23068 WTSSendMessageW
KERNEL32.dll
0xb23070 VirtualQuery
USER32.dll
0xb23078 GetProcessWindowStation
KERNEL32.dll
0xb23080 LocalAlloc
0xb23084 LocalFree
0xb23088 GetModuleFileNameW
0xb2308c GetProcessAffinityMask
0xb23090 SetProcessAffinityMask
0xb23094 SetThreadAffinityMask
0xb23098 Sleep
0xb2309c ExitProcess
0xb230a0 FreeLibrary
0xb230a4 LoadLibraryA
0xb230a8 GetModuleHandleA
0xb230ac GetProcAddress
USER32.dll
0xb230b4 GetProcessWindowStation
0xb230b8 GetUserObjectInformationW
EAT(Export Address Table) is none
KERNEL32.dll
0xb23000 GetVersionExW
USER32.dll
0xb23008 wsprintfW
GDI32.dll
0xb23010 BitBlt
ADVAPI32.dll
0xb23018 GetTokenInformation
SHELL32.dll
0xb23020 SHGetFolderPathA
ole32.dll
0xb23028 CoInitialize
USERENV.dll
0xb23030 GetUserProfileDirectoryA
ktmw32.dll
0xb23038 CreateTransaction
crypt.dll
0xb23040 BCryptDecrypt
CRYPT32.dll
0xb23048 CryptStringToBinaryA
SHLWAPI.dll
0xb23050 StrCmpNW
WINHTTP.dll
0xb23058 WinHttpSendRequest
gdiplus.dll
0xb23060 GdiplusStartup
WTSAPI32.dll
0xb23068 WTSSendMessageW
KERNEL32.dll
0xb23070 VirtualQuery
USER32.dll
0xb23078 GetProcessWindowStation
KERNEL32.dll
0xb23080 LocalAlloc
0xb23084 LocalFree
0xb23088 GetModuleFileNameW
0xb2308c GetProcessAffinityMask
0xb23090 SetProcessAffinityMask
0xb23094 SetThreadAffinityMask
0xb23098 Sleep
0xb2309c ExitProcess
0xb230a0 FreeLibrary
0xb230a4 LoadLibraryA
0xb230a8 GetModuleHandleA
0xb230ac GetProcAddress
USER32.dll
0xb230b4 GetProcessWindowStation
0xb230b8 GetUserObjectInformationW
EAT(Export Address Table) is none